Predicting Android malware combining permissions and API call sequences

被引:6
作者
Chen, Xin [1 ]
Yu, Haihua [1 ]
Yu, Dongjin [1 ]
Chen, Jie [1 ]
Sun, Xiaoxiao [1 ]
机构
[1] Hangzhou Dianzi Univ, Sch Comp Sci & Technol, Hangzhou 310018, Peoples R China
基金
中国国家自然科学基金;
关键词
Android malware; Malware detection; Permission; API call sequence; CNN; FRAMEWORK;
D O I
10.1007/s11219-022-09602-4
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Malware detection is an important task in software maintenance. It can effectively protect user information from the attack of malicious developers. Existing studies mainly focus on leveraging permission information and API call information to identify malware. However, many studies pay attention to the API call without considering the role of API call sequences. In this study, we propose a new method by combining both the permission information and the API call sequence information to distinguish malicious applications from benign applications. First, we extract features of permission and API call sequence with a decompiling tool. Then, one-hot encoding and Word2Vec are adopted to represent the permission feature and the API call sequence feature for each application, respectively. Based on this, we leverage Random Forest (RF) and Convolutional Neural Networks (CNN) to train a permission-based classifier and an API call sequence-based classifier, respectively. Finally, we design a linear strategy to combine the outputs of these two classifiers to predict the labels of newly arrived applications. By an evaluation with 15,198 malicious applications and 15,129 benign applications, our approach achieves 98.84% in terms of precision, 98.17% in terms of recall, 98.50% in terms of F1-score, and 98.52% in terms of accuracy on average, and outperforms the state-of-art method Malscan by 2.12%, 0.27%, 1.20%, and 1.24%, respectively. In addition, we demonstrate that the method combining two features achieves better performance than the methods based on a single feature.
引用
收藏
页码:655 / 685
页数:31
相关论文
共 38 条
[1]  
Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
[2]   Intelligent mobile malware detection using permission requests and API calls [J].
Alazab, Moutaz ;
Alazab, Mamoun ;
Shalaginov, Andrii ;
Mesleh, Abdelwadood ;
Awajan, Albara .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 107 :509-521
[3]  
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1109/MSR.2016.056, 10.1145/2901739.2903508]
[4]  
[Anonymous], 1998, On-line learning in neural networks, DOI DOI 10.1017/CBO9780511569920.003
[5]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[6]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[7]  
Burguera I., 2011, P 1 ACM WORKSH SEC P
[8]   A novel parallel classifier scheme for vulnerability detection in Android [J].
Garg, Shivi ;
Baliyan, Niyati .
COMPUTERS & ELECTRICAL ENGINEERING, 2019, 77 :12-26
[9]  
Han B, 2014, SCI WORLD J, DOI [10.1155/2014/724804, 10.1155/2014/132713]
[10]  
Harris D., 2010, Digital design and computer architecture